Term
1. What is crosstalk and what are two ways to reduce it? |
|
Definition
Occurs when a signal is induced into one circuit from another; physical separation of open wire pairs or insulating conductors and twisting them together. |
|
|
Term
2. What is the most commonly used cabling? |
|
Definition
Unshielded twisted pair (UTP). |
|
|
Term
3. What standard categorizes cabling? |
|
Definition
|
|
Term
4. What principles does the ANSI/TIA/EIA–568–B standard address? |
|
Definition
Subsystems of structured cabling, minimum requirements for telecommunications cabling, installation methods and practices, connector and pin assignments, life span of a telecommunications cabling system (should exceed 10 years), media types and performance specifications for horizontal and backbone cabling, connecting hardware performance specifications, recommended topology and distances, and definitions of cabling elements (horizontal cable, cross-connects, equipment rooms, etc). |
|
|
Term
5. What test is performed to determine the time needed for the transmission of signal to travel the length of a single pair of wires? |
|
Definition
|
|
Term
1. What are the six subsystems of a structured cabling system per ANSI/TIA/EIA–568–B? |
|
Definition
. Entrance facilities, equipment rooms, backbone cabling, telecommunications rooms, horizontal cabling, and work areas. |
|
|
Term
2. What is the standard used for labeling cables? |
|
Definition
|
|
Term
1. When must a secure means of information transference be used? |
|
Definition
When information systems or networks that process classified national security information in more than one controlled access area (CAA) require the transfer of that information between the CAAs. |
|
|
Term
2. Who is legally responsible for the operation of the PDS and the security of the information traversing it? |
|
Definition
The Designated Approval Authority (DAA). |
|
|
Term
3. In the RED/BLACK concept, what are BLACK lines? |
|
Definition
Lines that carry either encrypted classified or unclassified traffic. |
|
|
Term
|
Definition
The protection to deny unathorized personnel national security information of value that might be derived from communications systems and cryptographic equipment and their compromising emanations. |
|
|
Term
|
Definition
The complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance. In this area, only personnel authorized to the level of the classified information being processed are allowed unescorted access. |
|
|
Term
6. What does operating a PDS require? |
|
Definition
Countinuous physical security integrity. |
|
|
Term
7. What is a PDS line route inspection? |
|
Definition
A close visual inspection of the PDS for signs of penetration, tampering, and any other anomaly that may cause a deterioration of protection safeguards. |
|
|
Term
1. Voice encryption telephone devices are designed for what? |
|
Definition
To operate reliably with high-voice quality as both ordinary and secure telephones over the public switched telephone network (PSTN). |
|
|
Term
2. What is the difference between data and voice encryption? |
|
Definition
Voice is encrypted before it leaves the source, and data is encrypted by an encryption device which is separate from the source (e.g., a computer). |
|
|
Term
3. What are the two basic components of cryptology? |
|
Definition
|
|
Term
4. In an asymmetric system, all communications involve what? |
|
Definition
|
|
Term
5. In combination encryption, what are certificates? |
|
Definition
Digitally signed data structures that bind the identity of the certificate holder to a public key. |
|
|
Term
6. Explain a user’s browser to web server encryption sequence? |
|
Definition
The web server gives the browser its public key. The browser encrypts transmissions to the web server with the server’s public-key. The web server then uses its private-key to decrypt the client’s transmissions. The browser also creates a public and private key and sends the web-server its public key. SSL uses third party Certification Authorities to identify and authenticate web surfers and web servers. |
|
|
Term
7. Explain Data Encryption Standard (DES). |
|
Definition
It is a publicly known cryptographic algorithm that converts plaintext into ciphertext using a key that consists of 64 bits. Of these, 56 bits are randomly generated and used directly by the algorithm. The extra eight bits are used for error detection. The system uses algorithm operations that mix the data and keys together. |
|
|
Term
8. Why is Advanced Encryption System (AES) better than DES? |
|
Definition
AES uses the Rijndael algorithm which utilizes 128-bit, 192-bit, and 256-bit key lengths, and DES only uses 64-bits. |
|
|
Term
9. What are the four types of encryption for telecommunications systems? |
|
Definition
Wideband, narrowband, bulk and network. |
|
|
Term
1. What is the definition of COMSEC? |
|
Definition
The measures and controls taken to deny unauthorized persons information derived from information systems of the US Government related to national security and ensure the authenticity of these information systems. |
|
|
Term
2. How does TRANSEC relate to COMSEC? |
|
Definition
It is the component of COMSEC resulting from the application of measures designed to protect information systems traffic from the interception and exploitation by means other than crypto-analysis. |
|
|
Term
3. What is critical information? |
|
Definition
Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment. |
|
|
Term
4. Explain the two-person integrity system. |
|
Definition
It is a storage and handling system that prohibits access to COMSEC keying material to unaccompanied individuals. TPI procedures require the presence of at least two authorized persons who both know TPI procedures and can detect incorrect or unauthorized security procedures for the performed task. |
|
|
Term
5. What is AFCOMSEC Form 16 used for? |
|
Definition
. To account for and create an inventory of COMSEC material by short title, edition, accounting control number, and quantity. |
|
|
Term
6. What should you look for before you open a COMSEC package? |
|
Definition
Make sure there is no evidence of tampering or forced entry. |
|
|
Term
7. What is AF Form 1109 used for? |
|
Definition
To record visitors into restricted areas. |
|
|
Term
1. What is the newest generation of secure voice and data equipment designed for use on advanced digital communications networks such as the Integrated Services Digital Network (ISDN)? |
|
Definition
Secure Terminal Equipment (STE) |
|
|
Term
2. What is the security core for the STE? |
|
Definition
KOV-14 cryptographic card (Fortezza card). |
|
|
Term
3. When not in use, how must the Fortezza card be stored? |
|
Definition
Separately from the STE in an approved security container. |
|
|
Term
4. In a KIV–7, what prevents unauthorized access and protects all internally stored keys? |
|
Definition
A removable cryptographic ignition key (CIK). |
|
|
Term
5. What happens in ESP tunnel mode? |
|
Definition
The original IP datagram is placed in the encrypted portion of the ESP and that entire frame is placed within a datagram having unencrypted IP headers. |
|
|
Term
6. What are the maximum throughputs of the TACLANE–Classic and TACLANE–E100? |
|
Definition
TACLANE Classic is 44.736 Mbps for ATM and 7 Mbps for IP, and TACLANE-E100 provides a maximum aggregate throughput of 165 Mbps full-duplex, or 100 Mbps half-duplex. |
|
|
Term
7. Where can a KG-175D get its IP address via DHCP? |
|
Definition
From a DHCP server on either the ciphertext or plaintext side. |
|
|
Term
8. Where can TACLANEs be used to overlay Secure Virtual Networks? |
|
Definition
On top of existing public and private network infrastructures. |
|
|
Term
1. What are fill devices used for? |
|
Definition
Storing and loading cryptographic keying material. |
|
|
Term
2. The AN/CYZ–10 is a single replacement for the common fill devices capable of doing what? |
|
Definition
Receiving, storing, and transferring variables. |
|
|
Term
3. What device functions like a PDA with a 400 MHz processor and Windows CE operating system? |
|
Definition
The AN/PYQ–10 Simple Key Loader (SKL). |
|
|